Acronyms (Security) Flashcards

(45 cards)

1
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CVE

A

Common Vulnerability Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EDR

A

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FACL

A

File System Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FIM

A

File Integrity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HA

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HIDS

A

Host-based Intrusion Detection System

20
Q

HIPS

A

Host-based Intrusion Prevention System

21
Q

HOTP

A

HMAC-based One-time Password

22
Q

IDS

A

Intrusion Detection System

23
Q

IoC

A

Indicators of Compromise

24
Q

NAC

A

Network access control

25
MAC | Access control
Mandatory Access Control
26
NIDS
Network-based Intrusion Detection System
27
NIPS
Network-based Intrusion Prevention System
28
OSINT
Open-source Intelligence
29
OVAL
Open Vulnerability Assessment Language
30
PAM
Privileged Access Management
31
PCAP
Packet Capture
32
RBAC | Not rule
Role-based Access Control
33
RBAC | Not role
Rule-based Access Control
34
SE Linux
Security-enhanced Linux
35
SIEM
Security Information and Event Management
36
SPIM
Spam over Internet Messaging
37
STIX
Structured Threat Information eXchange
38
TAXII
Trusted Automated eXchange of Indicator Information
39
TOTP
Time-based One-time Password
40
TTP
Tactics, Techniques, and Procedures
41
UEM
Unified Endpoint Management
42
UTM
Unified Threat Management
43
WIDS
Wireless Intrusion Detection System
44
WIPS
Wireless Intrusion Prevention System
45
XDR
Extended Detection and Response